Defenses and dangers: Understanding your data protection needs

The value of business data is constantly changing, and more so every year. Data used to consist of a few names and email addresses, some purchasing information and some contact details gleaned from badge-scans at the last event attended. As such, it was only valuable at certain times and rarely viewed as business critical.

Powering IoT with Low Latency Networks

Why edge computing is imperative in 5G networks
Previously, we looked at how service providers can make 5G a profitable business. A key part of this is also dependent upon service providers delivering distributed compute power as part of the 5G network itself by hosting thousands of mini data centers at the edge.

Differentiation in the 5G Era

How service providers can make 5G a profitable business
5G is nearly here. Three carriers have launched commercial 5G services in South Korea, now offering the service to enterprises. The race is on to take advantage of lower latency, higher speeds, greater coverage and massive capacity increases in order to be more responsive, move data faster and connect more sensors and smart devices to the network.

Speed, Scale, Reliability and the Pursuit of Programmability

As networking moves from monolithic to disaggregated infrastructure, the necessity of programmability has become existential, be it physical or software-defined networks (SDN). A common thread runs through these movements: the need for control.

As the notion of control continues to evolve, it will drive significant changes to the systems that form the foundations of the network.

Black Hat 2018: Securing the Expanding Cyberattack Landscape

There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception.

The sheer size of the cyber-attack surface becomes more daunting by the day. Networks now connect data centers and on-premise hardware to private and public clouds and IoT devices operating at the network edge, exposing more potential entry points and increasing vulnerability.